Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Customer Success: Using Log Data to Respond to Security Incidents

DZone's Guide to

Customer Success: Using Log Data to Respond to Security Incidents

· Performance Zone
Free Resource

Learn how real real-time monitoring is critical for DevOps. Because you can't build what you can't see.

One of the more unique customer use cases we’ve seen recently is allowing the security incident response team to use log data to track malicious attempts against their network.  It is well established that Logentries can maintain log data across all of your systems – but adding just a few more pieces of information can result in deep insights into your security measures and their effectiveness.Logs as Data for Security

So how do you do this today? Most current generation firewalls and routers support syslog capabilities and can be sent to Logentries for analysis.  By adding in logs from Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS) and vulnerability scanners, you can achieve a complete “beginning to end” view of an access attempt.

With the new grouping feature, you can easily group your edge router, firewall, internal routers, IDS/IPS, vulnerability scanner, and access, system, and error logs from the physical machines into one centralized location.  With just a few clicks you can easily be set-up to monitor these security logs in real-time and to trace a connection through your entire network to determine which security measures succeeded or failed. This gives you immediate visibility into if — and how – the network was exploited.

Have questions? Feel free to email me directly at tom.smit@Logentries.com, or contact our Support team at support@logentries.com!Using Logentries to identify security issues

Get real-time alerts and visualizations across your cloud infrastructure for real real-time cloud monitoring. Try it FREE now

Topics:

Published at DZone with permission of Trevor Parsons, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}